Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Ciolence & Oppression
The “Webification” of Jihadism: Trends in the Use of Online Platforms, Before and After Attacks by Violent Extremists in Nigeria

By Folahanmi Aina and John Sunday Ojo

Violent extremist organisations (VEOs) use social media platforms to promote extremist content and coordinate agendas.  The use of digital platforms to disseminate information and coordinate activities by VEOs in Nigeria has grown considerably in recent years. This report analyses the adoption of social media before and after attacks by Boko Haram, Islamic State of West Africa Province (ISWAP) and Ansaru. In the post-attack environment, Boko Haram, ISWAP and Ansaru use platforms to claim responsibility and display their strengths against the state’s security forces. By demonstrating their capacity to attack state security forces, the three groups aim to erode the public’s confidence in the state military’s capacity to safeguard national security. The key findings of this report are as follows: Boko Haram, ISWAP and Ansaru previously leveraged popular social media platforms, including YouTube, Facebook, Telegram and Instagram. These platforms were used to promote propaganda and create awareness regarding upcoming attacks. However, all three groups have now had their use of these platforms restricted or banned. ISWAP has switched to using WhatsApp as a secure platform for communication before, during and after attacks. Rocket.Chat and Telegram have also been instrumental in ISWAP’s information dissemination. Boko Haram uses Telegram to share its activities in the pre-attack and post-attack environments. Ansaru has yet to appear on social media platforms due to its underground activities, which are hard to monitor. The recent acquisition of high-speed satellite internet has enhanced ISWAP’s communication with its audience and enabled coordinated attacks. Combating the exploitation of social media platform by VEOs requires a multidimensional approach. Effective collaboration with technology companies becomes imperative to identify extremist content. Building technological infrastructure for the state requires synergistic collaboration with the military and intelligence agencies to enable the removal of extremism from social media platforms. Devising multilingual and specialised algorithms to detect coded extremism messages and audio-visual content is essential for effective counter-extremism digital architecture. Investing in current technology through research and algorithm development must be prioritised to identify violent extremist content in Nigeria and beyond.

London: Global Network on Extremism & Technology, 2023. 30p.

download
Cults and Online Violent Extremism

By Suzanne Newcombe, Sarah Harvey, Jane Cooper, Ruby Forrester, Jo Banks and Shanon Shah

The word ‘cultic’ is applied to a diverse range of online activity. This label is not always intended to convey a negative judgement; for example, individual influencers, music groups and brands aspire to a ‘cult following’. However, the use of the words ‘cult’ or ‘cultic’ is usually intended by the speaker as a judgement to draw attention to something that may have some elements typically associated with religion (for example, idealisation of a particular individual, a specific worldview and/or ritual practices) as well as the potential to cause harm and violence. This report proposes three ideal-typical groupings of online cultic activity that can glorify and inspire violent extremisms: ‘Cultic’ Religious Groups, ‘Online Cultic Milieus’ and ‘Cultic Fandoms’. This is not an exhaustive description of online activity that has been termed ‘cultic’ in popular culture, but it provides a good starting point for further analysis. This report argues that the understanding of ‘cults’ and online activity needs to be carefully nuanced; the complexities of online and offline activities that might result in violent extremism need to be analysed and risk assessed at the level of both group/social movement and individual. It is important to understand that there are a range of ways individuals interact with these cultic online environments that may or may not represent warning signs or pathways into violent extremism. A holistic understanding of both the nature of the cultic online milieu and an individual’s engagement with that environment is warranted before making assumptions about the nature of any individual’s engagement.

London: Global Network on Extremism and Technology (GNET), July 2023.

download
The violence dynamics in public security: military interventions and police-related deaths in Brazil

By Marcial A. G. Suarez, Luís Antônio Francisco de Souza, Carlos Henrique Aguiar Serra

This paper discusses the deadly use of violence as a public security agenda, focusing on police lethality and military interventions. Through a literature review to understanding concepts – such as “war,” for example – used in public security policy agendas, the study seeks to frame the notion of political violence, mainly referring to the policies designed to combat violence in Brazil. The objective is to problematize the public security policy based on the idea of confrontation, which adopts the logic of war and the notion of “enemy”. The paper is divided into three parts. The first is a conceptual approach to violence and war, and the second is the analysis of the dynamic of deadly use of force. Finally, the third part is a contextual analysis of violence in Rio de Janeiro, its characteristics, and central actors, using official statistics on violence in the region.

Brazil: Oñati Socio-Legal Series, 2021. 22p.

download
Governing the underworld: how organized crime governs other criminals in Colombian cities

By Reynell Badillo-Sarmiento & Luis Fernando Trejos-Rosero 

This article explores how organized criminal organizations exercise criminal governance over other organized and non-organized criminals using public messaging, lethal and extra-lethal violence. Drawing on extensive fieldwork, over 350 press reports, and an original database on inter-criminal lethal violence, we show, in line with recent literature on organized crime, that while these organizations use violence to build their reputation as actors willing to use force, they also provide benefits to other criminals such as financing and protection from state and competitors. This article contributes to the literature on criminal governance by elaborating on the mechanisms shown in recent work and by detailing an unexplored case study in Barranquilla (Colombia).

Colombia: Trends in Organized Crime, 2023. 27p.

download
Deepfakes on Trial: A Call To Expand the Trial Judge’s Gatekeeping Role To Protect Legal Proceedings from Technological Fakery

By Rebecca A. Delfino

Deepfakes—audiovisual recordings created using artificial intelligence (AI) technology to believably map one person’s movements and words onto another—are ubiquitous. They have permeated societal and civic spaces from entertainment, news, and social media to politics. And now deepfakes are invading the courts, threatening our justice system’s truth-seeking function. Ways deepfakes could infect a court proceeding run the gamut and include parties fabricating evidence to win a civil action, government actors wrongfully securing criminal convictions, and lawyers purposely exploiting a lay jury’s suspicions about evidence. As deepfake technology improves and it becomes harder to tell what is real, juries may start questioning the authenticity of properly admitted evidence, which in turn may have a corrosive effect on the justice system. No evidentiary procedure explicitly governs the presentation of deepfake evidence in court. The existing legal standards governing the authentication of evidence are inadequate because they were developed before the advent of deepfake technology. As a result, they do not solve the urgent problem of how to determine when an audiovisual image is fake and when it is not. Although legal scholarship and the popular media have addressed certain facets of deepfakes in the last several years, there has been no commentary on the procedural aspects of deepfake evidence in court. Absent from the discussion is who gets to decide whether a deepfake is authentic. This Article addresses the matters that prior academic scholarship on deepfakes obscures. It is the first to propose a new addition to the Federal Rules of Evidence reflecting a novel reallocation of fact-determining responsibilities from the jury to the judge, treating the question of deepfake authenticity as one for the court to decide as an expanded gatekeeping function under the Rules. The challenges of deepfakes—problems of proof, the “deepfake defense,” and juror skepticism—can be best addressed by amending the Rules for authenticating digital audiovisual evidence, instructing the jury on its use of that evidence, and limiting counsel’s efforts to exploit the existence of deepfakes.

Hastings Law Journal, 2023. 57p.

download
Challenge Trial Judges Face When Authenticating Video Evidence in the Age of Deepfakes

By Taurus Myhand

The proliferation of deepfake videos has resulted in rapid improvements in the technology used to create them. Although the use of fake videos and images are not new, advances in artificial intelligence have made deepfakes easier to make and harder to detect. Basic human perception is no longer sufficient to detect deepfakes. Yet, under the current construction of the Federal Rules of Evidence, trials judges are expected to do just that. Trial judges face a daunting challenge when applying the current evidence authentication standards to video evidence in this new reality of widely available deepfake videos. This article examines the gatekeeping role trial judges must perform in light of the unique challenges posed by deepfake video evidence. This article further examines why the jury instruction approach and the rule change approaches proposed by other scholars are insufficient to combat the grave threat of false video evidence. This article concludes with a discussion of the affidavit of forensic analysis approach, a robust response to the authentication challenges posed by deepfakes. The AFA approach preserves most of the current construction of the Federal Rules of Evidence while reviving the gatekeeping role of the trial judge in determining the admissibility of video evidence. The AFA will provide the trial judges with the tools necessary to detect and exclude deepfake videos without leaving an everlasting taint on the juries that would have otherwise seen the falsified videos.

Widener Law Review, 2023. 19p.

download
 The Thirteenth Amendment: Modern Slavery, Capitalism, and Mass Incarceration

By Michele Goodwin

On August 31, 2017, The New York Times published a provocative news article, “The Incarcerated Women Who Fight California’s Wildfires.” California is particularly known for its wildfires.1 The dry-air, hot-weather conditions that persist much of the year and limited rainfall create the conditions that make pockets of the state ripe for devastating wildfires. Strong winds, often referred to as the Diablo (or the devil), radiate in the northern part of the state, exacerbating the already vulnerable conditions. The Santa Ana winds do the same in southern counties. Fighting these fires can be a matter of life or death. In fact, Shawna Lynn Jones died in 2016, only hours after battling a fire in Southern California. She was nearly done with a three-year sentence—barely two months remained of her incarceration. However, the night before, at 3 a.m., she and other women had been called to put out a raging fire. Tyquesha Brown recalls that the fire that night required traversing a steep hillside of loose rocks and soil.2 This made their task even more challenging. Another woman told a reporter that Jones struggled that night—the weight of her gear and chain  made it difficult for her to establish footing to hike up the hill where the fire blazed.3 However, she and the other women of Crew 13-3 performed their duties, holding back the fire so that it did not “jump the line.”4 By doing so, they saved expensive properties in Malibu. However, Jones was dead by 10 a.m. the next morning.5 For “less than $2 an hour,” female inmates like Shawna Jones and Tyquesha Brown “work their bodies to the breaking point” with this dangerous work.6 The women trudge heavy chains, saws, medical supplies, safety gear, and various other equipment into burning hillsides surrounded by intense flames. On occasion, they may arrive “ahead of any aerial support or local fire trucks,”7 leaving the prisons in the peak of night, when it is pitch black, arriving before dawn to the color of bright flames and intense heat. Sometimes the women are called upon to “set the line,” meaning they clear “potential fuel from a six-foot-wide stretch of ground” between the source of the fire (or whatever is burning) and the land or property in need of protection.8 They dig trenches, moving toward the fire with tools in hand, keeping about ten feet apart from each other while calling out conditions.9 The women cut wood, clearing it before the flames lick at its brittle brush. After, they scrape or shovel—all in syncopation—while clouds of smoke envelope them. For protection, thin bandanas or yellow handkerchiefs cover their mouths. They operate in a frightening rhythm of sorts: saw, hook, shovel, and rake charred earth, trees, or whatever remains from the blazing fire. To the naked eye, the women could appear to represent progress. For too long, state, federal, and local agencies excluded women from professions that demanded the service of their bodies at the front lines of anything other than childbearing, motherhood, and domestic duties. Women waged legal battles to become firefighters and police officers.10 Thus, a glance at the women battling California’s fires might convey a message of hope and that the only battles left are the fires themselves—and not the persistent claims of institutional and private discrimination,11 such as colleagues urinating on their beds,12 sexual harassment,13 and retaliation for performing their jobs well.

New York: Cornell Law Review, 2019.

download
Pooled Prevalence of Violence Against Men: A Systematic Review and Meta-analysis of a Silent Crises

By Sana Rehman, Memona Habib, and Saad Bin Tahir

Intimate partner violence (IPV) against men has become a serious and widespread public health issue, but limited research about the occurrence of female-to-male violence is available, as most studies on the subject have focused on female victims only. The study aims to determine the pooled prevalence and predictors of physical, emotional, and sexual violence against men across all recall periods and the potential risk factors of male victimization. Databases of PubMed, PsycINFO, PsycARTICLES, Scopus, Google Scholar, Science Direct, EMBASE, and JSTOR were searched. Data were extracted from studies published in 2010 to 2022. A systematic review and Random effect meta-analyses for the pooled prevalence were performed. Thirty studies with 58,357 participants were included in the final analysis. The pooled prevalence of Physical IPV was 20% (95% CI: 11–28%), Psychological IPV was 44% (95% CI: 30–59%), and Sexual IPV was 7% (95% CI: 3.1–10%) in Victimization for all recall periods, respectively. Findings demonstrated psychological IPV as the most prevalent form of IPV among men, which suggests that effective attempts are required to develop related prevention programs for victims. Furthermore, gender, age, substance abuse, socioeconomic status, multiple sex partners, history of abuse, and childhood victimization were found to be the predictors of IPV among men. Implementations of policies are also needed to reduce IPV. The findings of the study were discussed in terms of counselling and interventions.

Violence and Gender: Volume: 10 Issue 4: December 8, 2023

Download
No longer a civil matter? The design and use of protection orders for domestic violence in England and Wales

By Lis Bates and Marianne Hester

This paper assesses the design and use of protection orders for domestic violence in England and Wales. It draws on data from 400 police classified domestic violence incidents and 65 interviews with victims/survivors, as well as new analysis of government justice data from England and Wales, to address a gap in literature on protection orders.

The paper identifies an increasing civil-criminal ‘hybridisation’ of protection orders in England and Wales, and argues that a dual regime has developed, with orders issued by police and/or in criminal proceedings increasingly privileged (and enforced) over victim-led civil orders. Whilst protection orders are being used – as intended – flexibly to protect domestic violence victims, the way they are applied in practice risks downgrading domestic violence in criminal justice terms.

The conclusions are especially timely in light of current Government proposals to rationalise protection orders by introducing a single overarching Domestic Abuse Protection Order in England and Wales.

Bristol, UK: Centre for Gender and Violence Research University of Bristol , 2020. 41p.

Download
An Examination into the Present and Future of Protective Orders Regulating the Family Home in England and Wales

By Ana Speed and Kayliegh Richardson

Occupation orders are the dedicated legal remedy through which victims of domestic abuse can be supported to remain in the family home following a relationship breakdown. Case law indicates, however, that victims experience barriers to securing orders due to the high threshold criteria and because concerns about protecting the rights of perpetrators has led to judicial reluctance to grant extensive protection to victims. The options for providing protection to victims of abuse in respect of the family home are shortly set to be reformed by the Domestic Abuse Act 2021, which creates a new Domestic Abuse Protection Order (DAPO). It is anticipated that DAPOs will be easier to secure because they will have a lower threshold criteria, they will be available in family, civil and criminal proceedings, and both victims and third parties will be able to make an application thereby alleviating the burden on victims who feel unable to take any action. Whilst there is no intention at this point to repeal occupation orders, the Home Office has acknowledged that ‘DAPOs will become the ‘go to’ protective order in cases of domestic abuse’ suggesting that occupation orders will be replaced by DAPOs in most cases.

By drawing on data obtained from an analysis of court statistics, a questionnaire of legal practitioners and domestic abuse specialists, and in-depth interviews with victims of domestic abuse, this paper offers original empirical insights into where the current law fails victims of domestic abuse. The analysis reveals three key barriers to securing occupation orders. Firstly, despite the Legal Aid, Sentencing and Punishment of Offenders Act 2012 making efforts to preserve legal aid for victims of domestic abuse, the means test is difficult for victims to satisfy, resulting in increases both to the number of victims taking no action to pursue protection and who act as litigants in person in occupation order proceedings. Secondly, the prospects of a victim securing protection can be adversely affected by their unrepresented status. Thirdly, despite case law indicating a less restrictive approach to granting occupation orders, many victims continue to struggle to satisfy the strict threshold criteria. Some judges are seemingly willing to bypass this by granting alternative remedies which may offer victims a weaker form of protection in respect of the family home. Where orders are granted, the data suggest this is on restricted terms and for limited durations which reduce their effectiveness at preventing post-separation abuse and supporting victims to regulate their short and longer-term housing situation. These empirical findings are then situated within a discussion of the Domestic Abuse Act 2021. The authors analyse whether forthcoming DAPOs are likely to offer a more accessible and effective form of protection than occupation orders. The analysis suggests that by increasing the scope of applicants, the breadth and flexibility of available protection and the sanctions for breach, DAPOs have the potential to remedy many of the existing barriers to securing protection over the family home. As is always the case with new legislation however, the key will be in its implementation, to ensure that existing issues are not simply transferred across to the new regime. The findings are novel because academic commentaries on protective injunctions typically focus on ‘personal protection’ offered by non-molestation orders, domestic violence protection orders, and restraining orders, meaning that both occupation orders and protection for victims in respect of the family home are under-researched areas of domestic abuse.

Journal of Criminal Law Volume 86, Issue 3 Jun 2022 Pages 145-220

Download
Situational crime prevention of antiquities trafficking: a crime script analysis.

By Christine Acosta Weirich

In the aftermath of the Arab Spring in 2011, many nations in the Cradle of Civilization faced civil unrest, much of which continues today in the form of the ongoing Syrian Civil War, the conflict in Yemen, and instability in nations such as Iraq and Turkey. As a consequence, antiquities and cultural heritage in the region are currently facing a notoriously exacerbated level of risk. Despite the looting and destruction of cultural objects and monuments presenting a longstanding global and historical trend, the field of antiquities trafficking research lacks a unique and effective perspective within its current body of work and research. Likewise, criminology as a scientific field of study has largely overlooked the complex issue of looting and trafficking of cultural objects. This thesis focuses on the issue of Antiquities Trafficking Networks from a crime prevention perspective and attempts to demonstrate the effectiveness and apt nature of Crime Script Analysis and Situational Crime Prevention. This is accomplished first with a study and analysis of the wider phenomenon of Antiquities Trafficking Networks (from looting to market), followed by a specific case study of antiquities trafficked from within Syria since the beginning of the Civil War. Following these analyses, thirteen prominent Situational Crime Prevention strategies for Antiquities Trafficking Networks, and ten strategies for future conflict zones are generated by this research project. Through these strategies, Crime Script Analysis – in conjunction with Situational Crime Prevention – has proven to be a highly effective and efficient method and framework for studying this particularly difficult field. Ultimately, this thesis proposes a new crime prevention-focused methodology, to help tackle the issue of antiquities trafficking, as well as presenting one of the first prevention-specific analyses in this area. In doing so, it offers a basic model that maps the structure and necessary elements for antiquities trafficking to occur and allows for future research projects to adapt or customize this script model to situation-specific cases of antiquities looting, transit, and marketing.

Ph.D. Thesis. Glasgow: University of Glasgow, 2018. 312p.

Download
Identities Destroyed, Histories Revised The Targeting of Cultural Heritage and Soft Targets by Illicit Actors

By Michaela Millinder

KEY FINDINGS

  • Illicit actors, including terrorists, target cultural heritage and soft targets for a myriad of motivations: for financial gain and to diversify revenue streams, to validate their narratives or propaganda, and to systematically erase communities’ collective identities, both to subjugate these societies and re-write and control their histories. These seemingly divergent motivations are not exclusive, and the same illicit actor can destroy cultural heritage for propaganda and profit from its sale.

  • The intentional destruction of cultural heritage, which is a war crime, often occurs concurrently with other human rights abuses and is a condition that can be conducive to genocide. It can furthermore hinder post-conflict recovery and peacebuilding efforts.

  • Due to the inherent aspects of cultural heritage and soft targets, protection challenges include: tensions in balancing security and civilian access to sites or public spaces, lack of awareness and education on the risks to cultural heritage, the multiplicity of actors involved in cultural heritage management and, at times, the difficulty in securing their engagement, siloed responses, limited resources, and state involvement in the targeting and destruction of cultural heritage.

  • Risk assessments, information sharing, cross-sectoral and agency partnerships, educational and awareness raising efforts, including on the threats facing cultural heritage, and prosecutions and international accountability mechanisms have all been utilized as good protection practices and responses.

  • Recommendations: Share risk assessments locally, regionally, and globally across relevant sectors and agencies with adequate international assistance; align soft target and critical infrastructure protection efforts; prioritize targeted education and public awareness on the importance of protecting cultural heritage and threats facing it; build capacity of stakeholders involved in protection efforts; and pursue accountability for cultural heritage destruction, including antiquities trafficking, and enforce penalties for violations.

New York: Soufan Center, 2024 26p.

Download
The overlap between child sexual abuse live streaming, contact abuse and other forms of child exploitation

By Coen Teunissen and Sarah Napier

We analysed the chat logs of seven Australia-based men who had committed 145 child sexual abuse (CSA) live streaming offences, to examine the overlap between this offending, contact sexual offending and engagement with child sexual abuse material (CSAM).

Four CSA live streaming offenders attempted to travel to offend against victims in person, in that they discussed travelling or actually booked flights in order to meet these children. Offenders also requested or received images and videos of victims they had viewed over live stream, and recorded live streams to produce CSAM.

Travelling to offend against children, use of CSAM and CSA live streaming appear to be interrelated and should be considered by law enforcement as potential risk factors for one another. Further, detection and removal of new CSAM, and scanning of live streams for abusive content, should be a priority for all electronic service providers.

Trends & issues in crime and criminal justice no. 671. Canberra: Australian Institute of Criminology. 2023. 16p.

Download
How to implement online warnings to prevent the use of child sexual abuse material

By Charlotte Hunn, Paul Watters, Jeremy Prichard, Richard Wortley, Joel Scanlan, Caroline Spiranovic and Tony Krone

Online CSAM offending is a challenge for law enforcement, policymakers and child welfare organisations alike. The use of online warning messages to prevent or deter an individual when they actively search for CSAM is gaining traction as a response to some types of CSAM offending. Yet, to date, the technical question of how warning messages can be implemented, and who can implement them, has been largely unexplored. To address this, we use a case study to analyse the actions individuals and organisations within the technology, government, non-government and private sectors could take to implement warning messages. We find that, from a technical perspective, there is considerable opportunity to implement warning messages, although further research into efficacy and cost is needed.

Trends & issues in crime and criminal justice no. 669. Canberra: Australian Institute of Criminology. 2023. 14p.

Download
Outlaw motorcycle gangs and domestic violence

By Anthony Morgan, Timothy Cubitt and Christopher Dowling

In this paper we explore the prevalence and patterns of recorded domestic violence offending among outlaw motorcycle gang (OMCG) members in New South Wales. We then compare domestic violence offending among a sample of OMCG members and other male offenders who committed their first recorded offence in the same year.

Forty percent of OMCG members had been proceeded against for a domestic violence offence in the last 10 years. OMCG members were twice as likely to have been proceeded against for domestic violence offences as the wider male offending population. Domestic violence offending by OMCG members was more harmful and charges were less likely to result in a guilty outcome.

OMCG members have a greater propensity for violence and this includes domestic violence. This research has implications for law enforcement and domestic violence support services.

Trends & issues in crime and criminal justice no. 670. Canberra: Australian Institute of Criminology. 2023. 17p.

Download
The role of depression in intimate partner homicide perpetrated by men against women: An analysis of sentencing remarks

By Siobhan Lawler, Hayley Boxall and Christopher Dowling

Previous research has shown that persons with depression are over-represented among perpetrators of intimate partner homicide (IPH). However, the relationship between IPH and depression is not well understood. This study explores the role of offender depression within a sample of 199 cases of male-perpetrated IPH in Australia, as described by judges in sentencing remarks. Over one-third of the IPH offenders had experienced depression at some point in their lifetime. Qualitative information about the onset and cause of depression, co-occurring risk factors and the relationship between depression and culpability is presented. Findings show that depression alone holds limited explanatory value for understanding IPH, and must be considered in the context of other co-occurring risk factors

Trends & issues in crime and criminal justice no. 672. Canberra: Australian Institute of Criminology. 2023. 16p.

Download
Online behaviour, life stressors and profit-motivated cybercrime victimisation

By Isabella Voce and Anthony Morgan

This study analyses data from a survey of Australian adult computer users conducted in June 2021 to examine the influence of online routine activities and life stressors on the likelihood of profit-motivated cybercrime victimisation.

Compared with non-victims, victims spent more time online, more frequently engaged in recreational online activities and were more likely to employ higher-risk online practices. Small-to-medium enterprise owners working from home were more likely to be victims. Respondents who had experienced recent increases in financial stress and gambling and negative impacts on interpersonal relationships during the COVID-19 pandemic were also more likely to be a victim of cybercrime.

Being accessible online and a lack of personal and physical guardianship are associated with an increased risk of being a victim, but other factors may influence the susceptibility of computer users to cybercrime victimisation. This has important implications for cybercrime responses

Trends & issues in crime and criminal justice no. 675. Canberra: Australian Institute of Criminology. 2023. 18p.

Download
Police and Children's Court outcomes for children aged 10 to 13

By Susan Baidawi, Rubini Ball, Rosemary Sheehan and Nina Papalia

This paper outlines a retrospective follow-up study of all Victorian children aged 10 to 13 years with police contact for alleged offending in 2017 (N=1,369). The sample comprised relatively few 10- and 11-year-olds, while boys and Aboriginal and Torres Strait Islander children were over-represented. Most alleged offending was non-violent (71%), particularly among 10-year-olds (82%). Most matters did not proceed to court (80%), including 55 percent of matters which received police cautions. Of matters proceeding to court, 37 percent were struck out or dismissed, and a further 53 percent had outcomes not involving youth justice supervision. Half of children (49%) had no alleged offending in the following two years.

Trends & issues in crime and criminal justice no. 679. Canberra: Australian Institute of Criminology. 2024. 21p

Download
Analysis of linked longitudinal administrative data on child protection involvement for NSW families with domestic and family violence, alcohol and other drug issues and mental health issues

By Betty Luu, Amy Conley Wright, Stefanie Schurer, Laura Metcalfe

In a data first, this ANROWS report, released in partnership with researchers from the University of Sydney, highlights approximately 33% of all reports to NSW’s Child Protection Helpline express concerns about a child experiencing domestic and family violence, either alone or in conjunction with parental mental health and or substance use issues.

The research uses the newly established NSW Human Services Dataset to see how families interact with a range of services, including police, child protection and health, over time. The analysis focuses on cases reported to the NSW Child Protection Helpline, unveiling the challenges families experience with domestic and family violence, alongside parental mental health or parental substance use issues.

The findings also confirm that domestic and family violence, parental substance use and parental mental health issues are strongly interlinked and contribute to children being placed in out-of-home care, with findings suggesting that the odds of a child being removed double when all three issues are present.

Sydney, Australia's National Research Organisation for Women's Safety (ANROWS), 2024.89P.

Download
Haiti: A Path to Stability for a Nation in Shock

By The International Crisis Group Latin America and Caribbean

What’s new? The assassination in July of Haitian President Jovenel Moïse, perpetrated with no apparent resistance from his elite security detail, and a bout of natural disasters weeks later have further destabilised an already fragile Haiti and intensified its humanitarian crisis at a time of extreme insecurity. Why does it matter? Coming amid intersecting political, human rights, economic and humanitarian crises, Moïse’s killing and other recent events have exposed the chronic failings of state authorities and difficulties in ensuring that foreign support is deployed effectively. Growing insecurity is also driving instability and increased migrant flows within and outside the country. What should be done? Funnelling aid to vulnerable people hit by recent natural disasters, preferably through local civil society, is the imperative. International back ing for prosecuting high-level crimes, police reform and support for a broad-based representative and inclusive interim government stand a better chance than a rush to elections of helping restore stability.

Bogotá/New York/Brussels, The International Crisis Group, 30 September 2021 24p.

Download